How to locate intruders

By on

Tracking down unwanted wireless access points can be a tricky task. Matthew Gray suggests that RF fingerprinting is the best way to go

The standard approaches toward network security – authenticate users, encrypt and secure the data path, and monitor usage – only touch a few of the concerns by securing the most obvious entry point. The number of "neighbourhood" access points, or APs, dwarfs the number of legitimate and rogue ...

Hi! You've reached one of our premium articles. This is available exclusively to subscribers.

It's free to register, and only takes a few minutes.

Once you sign up you'll have unlimited access to the full catalogue of Australia's best business IT content, as well as a daily news bulletin delivered straight to your inbox.

Register now
Copyright © SC Magazine, US edition

Most Read Articles

Log In

|  Forgot your password?